期刊文献+

应用入侵检测研究与进展 被引量:4

Research and Development of Application Intrusion Detection
下载PDF
导出
摘要 传统的基于网络和主机入侵检测系统有不足,促使应用入侵检测的研究得到重视。本文总结了应用入侵检测技术的研究现状及其进展,指出应用入侵检测技术研究的难点和需要解决的关键问题,对今后的发展趋势进行了分析和展望。 Traditional network-based intrusion detection system and host-based intrusion detection system are not enough, which make researches of application intrusion detection get attentions. The paper summaries the status and development of application intrusion detection, and points out the difficulties of research and the existing problems that need be solved. Finally, then future direction in this field is analyzed and discussed.
出处 《计算机科学》 CSCD 北大核心 2007年第7期10-13,41,共5页 Computer Science
基金 航空科学基金项目(02F52033) 江苏省高技术项目(BG2004-005)
关键词 应用入侵检测 入侵检测 信息安全 Application intrusion detection, Intrusion detection, Information security
  • 相关文献

参考文献29

  • 1Ammann P, Jaiodia S, McCollum C D, et al. Surviving information warfare attacks on databases. In: Proc. of the IEEE Symposium on Security and Privacy, Oakland, CA, 1997. 164-174
  • 2Lippmann R, Fried D, Graf I, et al. Evaluating intruston detection systems: The 1998 darpa off-line intrusion detection evaluation. In: Proc. of 2000 DARPA Information Survivability Conference and Exposition,Los Alamitos, CA, 2000. 12-26
  • 3Stolfo S, Fan D, Lee W. Credit card fraud detection using metalearning: Issues and initial results. In: Proc. of AAAI Workshop on AI Approaches to Fraud Detection and Risk Management, California, USA, 1997.83-90
  • 4Axelsson S. Intrusion Detection Systems: A Survey and Taxonomy: [Technical Report]. 99-15. Chalmers University of Technology, Dept of Computer Engineering, Goteborg, Sweden, 2000
  • 5Allen J, Christie A, Fithen W, et al. State of the Practice ot In- trusion Detection Technologies: [Technical Report ]. CMU/SEI- 99-TR-028, ESC-99-028. Carnegie Mellon University, Software Engineering Institute, January 2000
  • 6Almgren M, Lindqvist U. Application- Integrated Data Collection for Security Monitoring. In: Proceedings of the Fourth International Symposium on the Recent Advances in Intrusion Detection (RAID2001), Davis, USA, 2001. 22-36
  • 7Smaha S E. Haystack: an intrusion detection system. In: Proc. of the 4^th Aerospace Computer Security Applications Conference, Washington, USA, 1988. 37-44
  • 8Denning D E. An intrusion-detection model. IEEE Transaction on Software Engineering, 1987, SE-13:222-232
  • 9Sielken R S. Application Intrusion Detection: [Technical Report]. CS-99-17. University of Virginia Computer Science Department , June 1999
  • 10Yip R, Levitt K. Data Level Inference Detection in Database Systems. In:Proceedings of the 11th IEEE Computer Security Foundations Workshop, Rockport, Massachusetts, 1998. 179-189

二级参考文献59

  • 1李渝勤,孙丽华.基于规则的自动分类在文本分类中的应用[J].中文信息学报,2004,18(4):9-14. 被引量:20
  • 2Stolfo S,Fan D,Lee W. Credit card fraud detection using metalearning: Issues and initial results. In:Proc. AAAI Workshop on AI Approaches to Fraud Detection and Risk Management, 1997
  • 3Axelsson S. Intrusion Detection Systems: A Survey and Taxonomy, Chalmers University of Technology, Dept. of Computer Engineering, Go'' teborg, Sweden: [Technical Report 99-15]. 2000
  • 4Allen J,et al. State of the Practice of Intrusion Detection Technologies: [Technical Report CMU/SEI-99-TR-028 ]. ESC-99-028, Carnegie Mellon University, Software Engineering Institute, Jan. 2000
  • 5Sielken R S. Application intrusion detection: [Technical Report CS-99-17]. Department of Computer Science, University of Virginia, June 1999
  • 6Qian X,et al. Detection and elimination of inference channels in multilevel relational database systems. In: Proc. of the 1993IEEE Symposium on Research in Security and Privacy, 1993.196-205
  • 7Dawson S, et al. Maximizing Sharing of Protected Information.Journal of Computer and System Science, 2002, 64(3): 496-541
  • 8Hinke T H,Delugach H,Wolf R. A framework for inference-directed data mining. In: Proc. Tenth IFIP Working Conf.Database Security, Como, Italy, July 1996
  • 9Thuraisingham, Bhavani M. Security Checking in Relational Database Management Systems Augmented with Inference Engines. Computers and Security, 1987,6: 479 - 492
  • 10Yip R,Levitt K. Data Level Inference Detection in Database Systems. In: Proc. of the 11th IEEE Computer Security Foundations Workshop, Rockport, Massachusetts, June 1998. 179-189

共引文献145

同被引文献78

引证文献4

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部